/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/include/linux/netfilter/ |
H A D | xt_SECMARK.h | 19 char secctx[SECMARK_SECCTX_MAX]; member in struct:xt_secmark_target_info
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/include/linux/netfilter/ |
H A D | xt_SECMARK.h | 19 char secctx[SECMARK_SECCTX_MAX]; member in struct:xt_secmark_target_info
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netlabel/ |
H A D | netlabel_user.c | 101 char *secctx; local 117 &secctx, 119 audit_log_format(audit_buf, " subj=%s", secctx); 120 security_release_secctx(secctx, secctx_len);
|
H A D | netlabel_unlabeled.c | 436 char *secctx = NULL; local 503 &secctx, 505 audit_log_format(audit_buf, " sec_obj=%s", secctx); 506 security_release_secctx(secctx, secctx_len); 537 char *secctx; local 560 &secctx, &secctx_len) == 0) { 561 audit_log_format(audit_buf, " sec_obj=%s", secctx); 562 security_release_secctx(secctx, secctx_len); 599 char *secctx; local 621 &secctx, 1136 char *secctx; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cachefiles/ |
H A D | security.c | 25 _enter("{%s}", cache->secctx); 33 if (cache->secctx) { 34 ret = set_security_override_from_ctx(new, cache->secctx);
|
H A D | daemon.c | 77 { "secctx", cachefiles_daemon_secctx }, 497 * - command: "secctx <ctx>" 501 char *secctx; local 510 if (cache->secctx) { 515 secctx = kstrdup(args, GFP_KERNEL); 516 if (!secctx) 519 cache->secctx = secctx;
|
H A D | bind.c | 279 kfree(cache->secctx);
|
H A D | internal.h | 81 char *secctx; /* LSM security context */ member in struct:cachefiles_cache
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/extensions/ |
H A D | libxt_SECMARK.c | 28 XTOPT_POINTER(struct xt_secmark_target_info, secctx)}, 44 printf("selctx %s", info->secctx);
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/extensions/ |
H A D | libxt_SECMARK.c | 28 XTOPT_POINTER(struct xt_secmark_target_info, secctx)}, 44 printf("selctx %s", info->secctx);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/ |
H A D | cred.c | 704 * @secctx: The LSM security context to generate the security ID from. 711 int set_security_override_from_ctx(struct cred *new, const char *secctx) argument 716 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/ |
H A D | xfrm.h | 655 char *secctx; local 660 security_secid_to_secctx(secid, &secctx, &secctx_len) == 0) { 661 audit_log_format(audit_buf, " subj=%s", secctx); 662 security_release_secctx(secctx, secctx_len);
|